Blogu

Kosa kubwa la usalama la dunia ya kale: masomo ya usalama kutoka Bonde la Mingi

Shukrani kwa likizo ndefu ya kila mwaka ya Mastercard (tuna 25 siku!) Nilichukua safari ya wiki mbili kwenda Misri mwanzoni mwa mwezi huu kutembelea sehemu ambayo nimekuwa nikitaka kuona kwa muda mrefu: makaburi ya kifalme ya kifarao wa kale katika Bonde la Maraja. Kama mhandisi wa usalama, I could not help looking at these
Soma zaidi

Kazi za Usalama wa Mtandao

Jinsi ya kupata kazi ya kiwango cha mwanzo katika usalama wa mtandao

Kipengele hiki ni jibu kwa rafiki ambaye anatafuta nafasi ya usalama wa mtandao katika soko lenye changamoto kubwa. Kwa kuwa hili ni tatizo linaloenea siku hizi, Niliamua kuandika chapisho badala ya kuacha tu maoni. Takwimu mbalimbali kutoka vyanzo vingi zinaonyesha kuwa kuna pengo kubwa katika nafasi za usalama wa mtandao,…
Soma zaidi

Shambulio la Kisima cha Maji

Mashambulio ya Kisima cha Maji: jinsi APT na wahalifu wa mtandao wanavyopingia miundombinu salama

Mkutano wangu wa kwanza na ulimwengu wa wahalifu wa mtandao ulitokea kupitia kampeni ya shambulio la kisima cha maji miaka mingi iliyopita. I visited a Persian website and discovered that it was downloading malware onto visitorsbrowsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that
Soma zaidi

credential stuffing

Kuweka taarifa za siri sio DDoS!

I have heard this many times over the course of the last several years: someone is experiencing a heavy DDoS attack on their website. When I ask them what type of attack they are experiencing, the answer is usually that the bad guys are sending them thousands or even millions of POST requests. When I
Soma zaidi

application ddos attacks

Mashambulio ya DDoS ya kiwango cha programu, na jinsi yanavyoweza kupunguzwa

DDoS (distributed denial of service) and DoS (denial of service) attacks can be broadly classified into three categories based on the layers of the OSI model they target: network layer (Layer 3), transport layer (Layer 4), and application layer (Layer 7). Layer 3 and Layer 4 attacks are typically less complexeven though that they might
Soma zaidi

Web Application Firewall (WAF)

The WAF is dead, long live the WAF!

The web application firewall (WAF) is a security tool used to guard against unwanted access to web applications. It is often a security device that sits on top of a web server and guards against threats from the internet or from beyond the network perimeter. Unlike Layer 3 (Network) and Layer 4 (Transport) firewalls, which
Soma zaidi

Zombie Cookies Verizon Yahoo AOL

How to deal with new tracking techniques; Zombie cookies and Canvas fingerprinting

Canvas fingerprinting, and Zombie cookie trackers are nothing new; however, these methods are improved and have become notoriously effective over the time. Recently, a study revealed that one in every four 10,000 most visited websites on the internet uses canvas fingerprinting to track the visitors with up to 99.9% usahihi. The tracking attempt to collect
Soma zaidi

PHP Suhosin

The end of Suhosin; what is next?

For many years, I zealously have used Suhosin with any implementations of PHP5 on Apache2 or PHP-FPM Nginx webservers to defend against SQL injection and other common web attacks. In fact, PHP5 was so disastrous, both in terms of its core security, and its functions and modules that I could have never conceived using it
Soma zaidi